mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2026-03-12 03:08:34 +01:00
157 lines
No EOL
5.5 KiB
JSON
157 lines
No EOL
5.5 KiB
JSON
[
|
|
{
|
|
"id": 1011832467,
|
|
"name": "CVE-2025-47812-poc",
|
|
"full_name": "4m3rr0r\/CVE-2025-47812-poc",
|
|
"owner": {
|
|
"login": "4m3rr0r",
|
|
"id": 90191914,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90191914?v=4",
|
|
"html_url": "https:\/\/github.com\/4m3rr0r",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/4m3rr0r\/CVE-2025-47812-poc",
|
|
"description": "Wing FTP Server Remote Code Execution (RCE) Exploit (CVE-2025-47812)",
|
|
"fork": false,
|
|
"created_at": "2025-07-01T12:02:38Z",
|
|
"updated_at": "2025-07-10T10:47:47Z",
|
|
"pushed_at": "2025-07-02T18:22:51Z",
|
|
"stargazers_count": 9,
|
|
"watchers_count": 9,
|
|
"has_discussions": false,
|
|
"forks_count": 4,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 4,
|
|
"watchers": 9,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 1012048482,
|
|
"name": "CVE-2025-47812-poC",
|
|
"full_name": "0xcan1337\/CVE-2025-47812-poC",
|
|
"owner": {
|
|
"login": "0xcan1337",
|
|
"id": 76397553,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76397553?v=4",
|
|
"html_url": "https:\/\/github.com\/0xcan1337",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/0xcan1337\/CVE-2025-47812-poC",
|
|
"description": "Simple exploit for Wing FTP Server RCE (CVE-2025-47812) to run commands and get a reverse shell. For educational use only.",
|
|
"fork": false,
|
|
"created_at": "2025-07-01T18:20:04Z",
|
|
"updated_at": "2025-07-03T12:39:47Z",
|
|
"pushed_at": "2025-07-01T19:10:39Z",
|
|
"stargazers_count": 7,
|
|
"watchers_count": 7,
|
|
"has_discussions": false,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 7,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 1012781263,
|
|
"name": "CVE-2025-47812",
|
|
"full_name": "0xgh057r3c0n\/CVE-2025-47812",
|
|
"owner": {
|
|
"login": "0xgh057r3c0n",
|
|
"id": 144083709,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/144083709?v=4",
|
|
"html_url": "https:\/\/github.com\/0xgh057r3c0n",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/0xgh057r3c0n\/CVE-2025-47812",
|
|
"description": "Wing FTP Server RCE via Lua Injection",
|
|
"fork": false,
|
|
"created_at": "2025-07-02T21:51:39Z",
|
|
"updated_at": "2025-07-02T22:38:49Z",
|
|
"pushed_at": "2025-07-02T22:38:46Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 1013885899,
|
|
"name": "WingFTP-CVE-2025-47812-illdeed",
|
|
"full_name": "ill-deed\/WingFTP-CVE-2025-47812-illdeed",
|
|
"owner": {
|
|
"login": "ill-deed",
|
|
"id": 210107232,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/210107232?v=4",
|
|
"html_url": "https:\/\/github.com\/ill-deed",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/ill-deed\/WingFTP-CVE-2025-47812-illdeed",
|
|
"description": "Remote Command Execution exploit for Wing FTP Server (CVE-2025-47812)",
|
|
"fork": false,
|
|
"created_at": "2025-07-04T16:22:22Z",
|
|
"updated_at": "2025-07-04T16:44:21Z",
|
|
"pushed_at": "2025-07-04T16:44:18Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 1015416526,
|
|
"name": "CVE-2025-47812",
|
|
"full_name": "pevinkumar10\/CVE-2025-47812",
|
|
"owner": {
|
|
"login": "pevinkumar10",
|
|
"id": 191495526,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/191495526?v=4",
|
|
"html_url": "https:\/\/github.com\/pevinkumar10",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/pevinkumar10\/CVE-2025-47812",
|
|
"description": "Exploit for CVE-2025-47812 with custom psudo shell and robust error handling.",
|
|
"fork": false,
|
|
"created_at": "2025-07-07T13:20:48Z",
|
|
"updated_at": "2025-07-08T10:26:17Z",
|
|
"pushed_at": "2025-07-08T10:26:14Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
}
|
|
] |